Role engineering for enterprise security management [electronic resource] / Edward J. Coyne, John M. Davis.
By: Coyne, Edward J., PhD.
Contributor(s): Davis, John M | ebrary, Inc.
Material type:![materialTypeLabel](/opac-tmpl/lib/famfamfam/BK.png)
Item type | Current location | Collection | Call number | URL | Copy number | Status | Date due | Item holds |
---|---|---|---|---|---|---|---|---|
![]() |
IUKL Library | Subscripti | http://site.ebrary.com/lib/kliuc/Doc?id=10240780 | 1 | Available |
Includes bibliographical references and index.
The business case for role-based access control -- Role engineering in the phases of the system development life cycle -- Role engineering and why we need it -- Defining good roles -- The role engineering process -- Designing the roles -- Engineering the permissions -- Tools that can be used to assist the role engineering process -- Putting it all together : the role formation process -- What others have been doing -- Planning a role engineering effort -- Staffing for role engineering -- What can go wrong and why?
Electronic reproduction. Palo Alto, Calif. : ebrary, 2013. Available via World Wide Web. Access may be limited to ebrary affiliated libraries.
There are no comments for this item.